본문 바로가기

개발

(326)
개발/해킹
Searching passwords by using searching tool google.com QueryDescription inurl:/db/main.mdbASP-Nuke passwords filetype:cfm "cfapplication name" passwordColdFusion source with potential passwords filetype:pass pass intext:useriddbman credentials allinurl:auth_user_file.txtDCForum user passwords eggdrop filetype:user userEggdrop IRC user credentials filetype:ini inurl:flashFXP.iniFlashFXP FTP credentials filetype:url +inurl:"ftp://" +inurl:"@"FTP bookm.. 2012.02.05
개발/해킹
Using the Metasploit Console to Launch Exploits $ ./msfconsole 888 888 d8b888 888 888 Y8P888 888 888 88888888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888888 "888 "88bd8P Y8b888 "88b88K 888 "88b888d88""88b888888888 888 88888888888888 .d888888"Y8888.. 2012.02.05
개발/해킹
Apache Killer" a DDoS using the Range HTTP Header In 2007, a Google engineer, Michal Zalewski, published a memo detailing a potential vulnerability of both Apache and IIS Web Servers after investigating the HTTP/1.1 "Range" header implementation. He reported then: it is my impression that a lone, short request can be used to trick the server into firing gigabytes of bogus data into the void, regardless of the server file size, connection count,.. 2012.02.05
개발/해킹
JSUNPACK JSUNPACK A Generic JavaScript Unpacker CAUTION: jsunpack was designed for security researchers and computer professionals http://jsunpack.jeek.org/dec/go?report=8f3d0bc86a4041333de321f968d69d8c488b8812 다음 문서의 내용을 실행 할때 자바스크립트를 중지 하십시오 Submission permanent link 8f3d0bc86a4041333de321f968d69d8c488b8812 (Received 2010-10-21 07:26:09, img.js ) URL Status All Malicious or Suspicious Elements of Submi.. 2012.02.05
개발/해킹
MS Windows GDI Image Parsing Stack Overflow Exploit 4월 14일 공개된 MS GDI Image Parsing 관련 Exploit Code. Shellcode 는 넘 커서 파일첨부로 따로 ;; MS Windows GDI Image Parsing Stack Overflow Exploit (MS08-021) ///////////////////////////////////////////////////////////// ///Exploit the MS08-021 : Stack Overflow on GDI API ///Author: Lamhtz ///Date: April 14th, 2008 ///Usage: [filename] ///Function: Generate a crafted emf file which could /// automatically run cal.. 2012.02.05
개발/해킹
XSS 공격 및 방어 가이드 ____ / / ________________________________________________________________________/ /| / /| Cross Site Scripting - Attack and Defense guide / /|_____________________________________________________________________/ / .. 2012.02.05